First published: Wed Dec 28 2022(Updated: )
Authorization Bypass Through User-Controlled Key in GitHub repository usememos/memos prior to 0.9.1.
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Usememos Memos | <0.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-4799 is a vulnerability that allows an attacker to bypass authorization by using a user-controlled key in the GitHub repository usememos/memos prior to version 0.9.1.
CVE-2022-4799 has a severity level of 6.5 (high).
The vulnerability affects versions up to (but not including) 0.9.1 of the Usememos Memos software.
To fix CVE-2022-4799, update your Usememos Memos software to version 0.9.1 or later.
More information about CVE-2022-4799 can be found in the following references: [GitHub commit](https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53), [Huntr bounty](https://huntr.dev/bounties/c5d70f9d-b7a7-4418-9368-4566a8143e79).